First published: Tue Oct 24 2023(Updated: )
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Clearpass Policy Manager | <6.9.13 | |
Arubanetworks Clearpass Policy Manager | >=6.10.0<6.10.8 | |
Arubanetworks Clearpass Policy Manager | >=6.11.0<=6.11.4 | |
Arubanetworks Clearpass Policy Manager | =6.9.13 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.9.13-cumulative_hotfix_patch_3 | |
Arubanetworks Clearpass Policy Manager | =6.10.8 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_2 | |
Arubanetworks Clearpass Policy Manager | =6.10.8-cumulative_hotfix_patch_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-43507.
The severity level of CVE-2023-43507 is high.
The affected software of CVE-2023-43507 is Arubanetworks Clearpass Policy Manager versions up to 6.9.13, 6.10.0 to 6.10.8, and 6.11.0 to 6.11.4.
An attacker can exploit this vulnerability by conducting SQL injection attacks against the ClearPass Policy Manager instance.
Yes, a patch is available to fix CVE-2023-43507. It is recommended to update the ClearPass Policy Manager software to a version that is not affected by this vulnerability.